AU631111B2 - Improved variants of the fiat-shamir identification and signature scheme - Google Patents
Improved variants of the fiat-shamir identification and signature scheme Download PDFInfo
- Publication number
- AU631111B2 AU631111B2 AU28597/89A AU2859789A AU631111B2 AU 631111 B2 AU631111 B2 AU 631111B2 AU 28597/89 A AU28597/89 A AU 28597/89A AU 2859789 A AU2859789 A AU 2859789A AU 631111 B2 AU631111 B2 AU 631111B2
- Authority
- AU
- Australia
- Prior art keywords
- mod
- numbers
- entity
- modulus
- signature
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired
Links
- 238000000034 method Methods 0.000 claims abstract description 54
- 238000012827 research and development Methods 0.000 claims description 2
- 235000019227 E-number Nutrition 0.000 claims 1
- 239000004243 E-number Substances 0.000 claims 1
- 238000012795 verification Methods 0.000 description 6
- 230000006870 function Effects 0.000 description 5
- 230000002452 interceptive effect Effects 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 230000014509 gene expression Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 230000004044 response Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1016—Devices or methods for securing the PIN and other transaction-data, e.g. by encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/302—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3218—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
- Stringed Musical Instruments (AREA)
- Compounds Of Unknown Constitution (AREA)
- Peptides Or Proteins (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US145402 | 1988-01-19 | ||
US07/145,402 US4933970A (en) | 1988-01-19 | 1988-01-19 | Variants of the fiat-shamir identification and signature scheme |
Publications (2)
Publication Number | Publication Date |
---|---|
AU2859789A AU2859789A (en) | 1989-07-20 |
AU631111B2 true AU631111B2 (en) | 1992-11-19 |
Family
ID=22512949
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU28597/89A Expired AU631111B2 (en) | 1988-01-19 | 1989-01-18 | Improved variants of the fiat-shamir identification and signature scheme |
Country Status (8)
Country | Link |
---|---|
US (1) | US4933970A (fr) |
EP (1) | EP0325238B1 (fr) |
JP (1) | JPH0750375B2 (fr) |
AT (1) | ATE99818T1 (fr) |
AU (1) | AU631111B2 (fr) |
CA (1) | CA1331642C (fr) |
DE (1) | DE68911935T2 (fr) |
ES (1) | ES2049764T3 (fr) |
Families Citing this family (45)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2663141B1 (fr) * | 1990-06-11 | 1992-08-21 | France Etat | Procede de transfert de secret, par echange de deux certificats entre deux microcalculateurs s'authentifiant reciproquement. |
US5046094A (en) * | 1989-02-02 | 1991-09-03 | Kabushiki Kaisha Toshiba | Server-aided computation method and distributed information processing unit |
FR2654288B1 (fr) * | 1989-11-08 | 1996-11-29 | Europ Rech Electr Lab | Procede d'authentification d'une carte a microprocesseur et systeme le mettant en óoeuvre. |
CA2100576A1 (fr) * | 1991-01-18 | 1992-07-19 | David Naccache | Methode et dispositif de controle d'acces et/ou d'identification |
JP3456993B2 (ja) * | 1991-02-07 | 2003-10-14 | トムソン マルチメデイア ソシエテ アノニム | 識別および/またはディジタル署名を行うための方法および識別装置並びに検証装置 |
US5148479A (en) * | 1991-03-20 | 1992-09-15 | International Business Machines Corp. | Authentication protocols in communication networks |
US5224162A (en) * | 1991-06-14 | 1993-06-29 | Nippon Telegraph And Telephone Corporation | Electronic cash system |
US5231668A (en) * | 1991-07-26 | 1993-07-27 | The United States Of America, As Represented By The Secretary Of Commerce | Digital signature algorithm |
US5204901A (en) * | 1991-08-01 | 1993-04-20 | General Electric Company | Public key cryptographic mechanism |
US5247171A (en) * | 1992-04-17 | 1993-09-21 | Fiberoptic Sensor Technologies, Inc. | Drift correction for fiberoptic pressure sensors |
WO1993021708A1 (fr) * | 1992-04-20 | 1993-10-28 | Silvio Micali | Verification de clefs secretes dans un cryptosysteme de clefs publiques |
USRE36918E (en) * | 1992-04-20 | 2000-10-17 | Certco Llc | Fair cryptosystems and methods of use |
US5276737B1 (en) * | 1992-04-20 | 1995-09-12 | Silvio Micali | Fair cryptosystems and methods of use |
US5315658B1 (en) * | 1992-04-20 | 1995-09-12 | Silvio Micali | Fair cryptosystems and methods of use |
US5299262A (en) * | 1992-08-13 | 1994-03-29 | The United States Of America As Represented By The United States Department Of Energy | Method for exponentiating in cryptographic systems |
AU677269B2 (en) * | 1992-12-22 | 1997-04-17 | Telstra Corporation Limited | A cryptographic method |
US5426700A (en) * | 1993-08-23 | 1995-06-20 | Pitney Bowes Inc. | Method and apparatus for verification of classes of documents |
NZ336414A (en) * | 1993-12-01 | 2000-01-28 | Rpk Nz Ltd | Method of combining serial keystream output to produce encrypted bit stream using pseudorandom permutation and replacing byte(s) of serial keystream |
ATE429099T1 (de) * | 1994-02-24 | 2009-05-15 | Comcast Cable Holdings Llc | Verfahren und vorrichtung zur erstellung einer kryptographischen verbindung zwischen elementen eines systems |
US5787172A (en) * | 1994-02-24 | 1998-07-28 | The Merdan Group, Inc. | Apparatus and method for establishing a cryptographic link between elements of a system |
US5504817A (en) * | 1994-05-09 | 1996-04-02 | Yeda Research And Development Co. Ltd. At The Weizmann Institute Of Science | Method and apparatus for memory efficient variants of public key encryption and identification schemes for smart card applications |
FR2737369A1 (fr) * | 1995-07-26 | 1997-01-31 | Trt Telecom Radio Electr | Systeme de communication de messages cryptes selon un procede de type r.s.a. |
US6026163A (en) * | 1995-12-13 | 2000-02-15 | Micali; Silvio | Distributed split-key cryptosystem and applications |
FR2747257B1 (fr) * | 1996-04-09 | 1998-09-11 | Gilbert Henri | Procede d'identification et/ou de signature |
DE19703929A1 (de) * | 1997-02-04 | 1998-08-06 | Deutsche Telekom Ag | Verfahren zum Generieren einer digitalen Signatur und Verfahren zur Überprüfung der Signatur |
US6202150B1 (en) | 1997-05-28 | 2001-03-13 | Adam Lucas Young | Auto-escrowable and auto-certifiable cryptosystems |
US6389136B1 (en) | 1997-05-28 | 2002-05-14 | Adam Lucas Young | Auto-Recoverable and Auto-certifiable cryptosystems with RSA or factoring based keys |
US6122742A (en) * | 1997-06-18 | 2000-09-19 | Young; Adam Lucas | Auto-recoverable and auto-certifiable cryptosystem with unescrowed signing keys |
US6282295B1 (en) | 1997-10-28 | 2001-08-28 | Adam Lucas Young | Auto-recoverable and auto-certifiable cryptostem using zero-knowledge proofs for key escrow in general exponential ciphers |
US6243466B1 (en) | 1997-08-29 | 2001-06-05 | Adam Lucas Young | Auto-escrowable and auto-certifiable cryptosystems with fast key generation |
IL121862A (en) | 1997-09-29 | 2005-07-25 | Nds Ltd West Drayton | Distributed ird system for pay television systems |
FR2773406B1 (fr) * | 1998-01-06 | 2003-12-19 | Schlumberger Ind Sa | Procede d'authentification de cartes a circuit integre |
RU2153191C2 (ru) | 1998-09-29 | 2000-07-20 | Закрытое акционерное общество "Алкорсофт" | Способ изготовления вслепую цифровой rsa-подписи и устройство для его реализации (варианты) |
RU2157001C2 (ru) | 1998-11-25 | 2000-09-27 | Закрытое акционерное общество "Алкорсофт" | Способ проведения платежей (варианты) |
US6473508B1 (en) | 1998-12-22 | 2002-10-29 | Adam Lucas Young | Auto-recoverable auto-certifiable cryptosystems with unescrowed signature-only keys |
FR2788909B1 (fr) | 1999-01-27 | 2004-02-20 | France Telecom | Procede d'authentification ou de signature a nombre de calculs reduit |
EP1056241B1 (fr) * | 1999-05-27 | 2004-08-04 | Robert Bosch Gmbh | Procédé de chiffrage d'une information numérique et module de transmission |
WO2002035327A2 (fr) * | 2000-10-24 | 2002-05-02 | Nds Limited | Transfert de contenu electronique |
FR2850479B1 (fr) * | 2003-01-24 | 2005-04-29 | France Telecom | Procede cryptographique a cle publique pour la protection d'une puce contre la fraude |
US7551737B2 (en) * | 2003-03-31 | 2009-06-23 | International Business Machines Corporation | Cryptographic keys using random numbers instead of random primes |
EP2021926A4 (fr) | 2006-05-05 | 2009-07-15 | Hybir Inc | Système de sauvegarde de fichiers informatiques incrémentaux et complets axés sur le groupe, processus et appareil |
EP2078274B1 (fr) | 2006-11-02 | 2015-09-09 | NDS Limited | Système de protection de contenus du point de vue en termes de confidentialité |
US7975142B2 (en) * | 2006-12-04 | 2011-07-05 | Electronics And Telecommunications Research Institute | Ring authentication method for concurrency environment |
KR101094339B1 (ko) | 2010-03-31 | 2011-12-19 | 고려대학교 산학협력단 | 오류주입 공격에 안전한 피아트 샤미르 개인 식별 장치, 방법 및 그 기록 매체 |
WO2021080449A1 (fr) | 2019-10-23 | 2021-04-29 | "Enkri Holding", Limited Liability Company | Procédé et système d'identification anonyme d'un utilisateur |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4405829A (en) * | 1977-12-14 | 1983-09-20 | Massachusetts Institute Of Technology | Cryptographic communications system and method |
US4424414A (en) * | 1978-05-01 | 1984-01-03 | Board Of Trustees Of The Leland Stanford Junior University | Exponentiation cryptographic apparatus and method |
US4351982A (en) * | 1980-12-15 | 1982-09-28 | Racal-Milgo, Inc. | RSA Public-key data encryption system having large random prime number generating microprocessor or the like |
AU572446B2 (en) * | 1981-01-28 | 1988-05-12 | Trans-Cryption Inc. | Personal identification system |
FR2549989B1 (fr) * | 1983-07-29 | 1985-09-13 | Philips Ind Commerciale | Systeme d'authentification entre un lecteur de carte et une carte de paiement echangeant des informations |
US4625076A (en) * | 1984-03-19 | 1986-11-25 | Nippon Telegraph & Telephone Public Corporation | Signed document transmission system |
US4736423A (en) * | 1985-04-30 | 1988-04-05 | International Business Machines Corporation | Technique for reducing RSA Crypto variable storage |
US4748668A (en) * | 1986-07-09 | 1988-05-31 | Yeda Research And Development Company Limited | Method, apparatus and article for identification and signature |
-
1988
- 1988-01-19 US US07/145,402 patent/US4933970A/en not_active Expired - Lifetime
-
1989
- 1989-01-18 DE DE89100825T patent/DE68911935T2/de not_active Expired - Lifetime
- 1989-01-18 EP EP89100825A patent/EP0325238B1/fr not_active Expired - Lifetime
- 1989-01-18 AU AU28597/89A patent/AU631111B2/en not_active Expired
- 1989-01-18 CA CA000588548A patent/CA1331642C/fr not_active Expired - Lifetime
- 1989-01-18 AT AT89100825T patent/ATE99818T1/de not_active IP Right Cessation
- 1989-01-18 ES ES89100825T patent/ES2049764T3/es not_active Expired - Lifetime
- 1989-01-18 JP JP1009618A patent/JPH0750375B2/ja not_active Expired - Lifetime
Also Published As
Publication number | Publication date |
---|---|
ES2049764T3 (es) | 1994-05-01 |
JPH01309088A (ja) | 1989-12-13 |
US4933970A (en) | 1990-06-12 |
EP0325238A2 (fr) | 1989-07-26 |
ATE99818T1 (de) | 1994-01-15 |
DE68911935T2 (de) | 1994-04-28 |
CA1331642C (fr) | 1994-08-23 |
EP0325238A3 (en) | 1990-08-29 |
AU2859789A (en) | 1989-07-20 |
EP0325238B1 (fr) | 1994-01-05 |
JPH0750375B2 (ja) | 1995-05-31 |
DE68911935D1 (de) | 1994-02-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU631111B2 (en) | Improved variants of the fiat-shamir identification and signature scheme | |
Schnorr | Efficient signature generation by smart cards | |
US5231668A (en) | Digital signature algorithm | |
Poupard et al. | Security analysis of a practical “on the fly” authentication and signature generation | |
Damgård et al. | A generalisation, a simplification and some applications of Paillier's probabilistic public-key system | |
CA2262549C (fr) | Acceleration de la cryptographie a cle publique par precalcul de paires generees aleatoirement | |
US4935962A (en) | Method and system for authentication | |
US5504817A (en) | Method and apparatus for memory efficient variants of public key encryption and identification schemes for smart card applications | |
Boneh et al. | On the importance of checking cryptographic protocols for faults | |
US5666414A (en) | Guaranteed partial key-escrow | |
EP0503119B1 (fr) | Système cryptographique à clé publique utilisant des courbes elliptiques sur des anneaux | |
Micali et al. | An improvement of the Fiat-Shamir identification and signature scheme | |
Tsiounis | Efficient electronic cash: new notions and techniques | |
Sander | Efficient accumulators without trapdoor extended abstract | |
EP1135886B1 (fr) | Systemes de chiffrement a courbes elliptiques choisies par les utilisateurs | |
JPH0746260B2 (ja) | 使用者識別装置 | |
WO1998007253A9 (fr) | Acceleration de la cryptographie a cle publique par precalcul de paires generees aleatoirement | |
JP4809310B2 (ja) | エンティティの真正性又はメッセージの完全性を証明するための方法、システム、デバイス | |
US20110219233A1 (en) | Quadratic residue based password authenticated key exchange method and system | |
Damgård et al. | Client/server tradeoffs for online elections | |
EP0374225B1 (fr) | Procede et dispositif d'authentification | |
McCurley | Odds and ends from cryptology and computational number theory | |
JP2000511649A (ja) | 公開鍵暗号方法 | |
CN1322700C (zh) | 利用非对称密钥证明真实性或完整性的方法和计算机系统 | |
Yan et al. | Identity‐based signcryption from lattices |